Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 20 for enforcement (0.14 sec)

  1. CODE_OF_CONDUCT.md

    representative at an online or offline event.
    
    ## Enforcement
    
    Instances of abusive, harassing, or otherwise unacceptable behavior may be
    reported to the community leaders responsible for enforcement at
    .
    All complaints will be reviewed and investigated promptly and fairly.
    
    All community leaders are obligated to respect the privacy and security of the
    reporter of any incident.
    
    ## Enforcement Guidelines
    
    Registered: Sun Nov 03 09:35:10 UTC 2024
    - Last Modified: Thu Oct 17 06:18:13 UTC 2024
    - 5K bytes
    - Viewed (0)
  2. internal/auth/credentials.go

    	accessKeyMinLen = 3
    
    	// Maximum length for MinIO access key.
    	// There is no max length enforcement for access keys
    	accessKeyMaxLen = 20
    
    	// Minimum length for MinIO secret key for both server
    	secretKeyMinLen = 8
    
    	// Maximum secret key length for MinIO, this
    	// is used when autogenerating new credentials.
    	// There is no max length enforcement for secret keys
    	secretKeyMaxLen = 40
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue May 28 17:14:16 UTC 2024
    - 12K bytes
    - Viewed (0)
  3. docs/iam/access-management-plugin.md

    ## Configuration
    
    Access Management Plugin can be configured with environment variables:
    
    ```sh
    $ mc admin config set myminio policy_plugin --env
    KEY:
    policy_plugin  enable Access Management Plugin for policy enforcement
    
    ARGS:
    MINIO_POLICY_PLUGIN_URL*          (url)       plugin hook endpoint (HTTP(S)) e.g. "http://localhost:8181/v1/data/httpapi/authz/allow"
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Dec 13 22:28:48 UTC 2022
    - 4.4K bytes
    - Viewed (0)
  4. architecture/ambient/ztunnel.md

    This is fairly straightforward.
    
    First, we need to check that this traffic is allowed.
    Traffic may be denied by RBAC policies (especially from a `STRICT` mode enforcement, which denies plaintext traffic).
    
    If it is allowed, we will forward to the target destination.
    
    #### Hairpin
    
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Wed Jul 17 23:10:17 UTC 2024
    - 16.8K bytes
    - Viewed (0)
  5. cmd/config-current.go

    			Description: "enable Identity Plugin via external hook",
    		},
    		config.HelpKV{
    			Key:         config.PolicyPluginSubSys,
    			Description: "enable Access Management Plugin for policy enforcement",
    		},
    		config.HelpKV{
    			Key:             config.LoggerWebhookSubSys,
    			Description:     "send server logs to webhook endpoints",
    			MultipleTargets: true,
    		},
    		config.HelpKV{
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Sep 03 18:23:41 UTC 2024
    - 30.1K bytes
    - Viewed (0)
  6. README.md

       between services in the cluster and from a service to external
       services. The proxies form a _secure microservice mesh_ providing a rich
       set of functions like discovery, rich layer-7 routing, circuit breakers,
       policy enforcement and telemetry recording/reporting
       functions.
    
      > Note: The service mesh is not an overlay network. It
      > simplifies and enhances how microservices in an application talk to each
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Wed Oct 30 22:38:34 UTC 2024
    - 6.8K bytes
    - Viewed (0)
  7. guava/src/com/google/common/util/concurrent/CycleDetectingLockFactory.java

        return rank.getDeclaringClass().getSimpleName() + "." + rank.name();
      }
    
      /**
       * A {@code CycleDetectingLockFactory.WithExplicitOrdering} provides the additional enforcement of
       * an application-specified ordering of lock acquisitions. The application defines the allowed
       * ordering with an {@code Enum} whose values each correspond to a lock type. The order in which
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Fri Dec 15 19:31:54 UTC 2023
    - 35.9K bytes
    - Viewed (0)
  8. common-protos/k8s.io/api/policy/v1beta1/generated.proto

      // runtimeClass is the strategy that will dictate the allowable RuntimeClasses for a pod.
      // If this field is omitted, the pod's runtimeClassName field is unrestricted.
      // Enforcement of this field depends on the RuntimeClass feature gate being enabled.
      // +optional
      optional RuntimeClassStrategyOptions runtimeClass = 24;
    }
    
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 19.6K bytes
    - Viewed (0)
  9. common-protos/k8s.io/api/admissionregistration/v1alpha1/generated.proto

      // - binding: The resource name of the ValidatingAdmissionPolicyBinding
      // - expressionIndex: The index of the failed validations in the ValidatingAdmissionPolicy
      // - validationActions: The enforcement actions enacted for the validation failure
      // Example audit annotation:
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Mar 11 18:43:24 UTC 2024
    - 25.7K bytes
    - Viewed (0)
  10. cmd/admin-handlers-users_test.go

    	c.assertSvcAccInfoQueryable(ctx, userAdmClient, accessKey, cr.AccessKey, false)
    
    	// 3. Check S3 access
    	c.assertSvcAccS3Access(ctx, s, cr, bucket)
    
    	// Check that session policies do not apply - as policy enforcement is
    	// delegated to plugin.
    	{
    		svcAK, svcSK := mustGenerateCredentials(c)
    
    		// This policy does not allow listing objects.
    		policyBytes := []byte(fmt.Sprintf(`{
     "Version": "2012-10-17",
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sun Sep 22 00:33:43 UTC 2024
    - 47.3K bytes
    - Viewed (0)
Back to top